Skip to content

Commit ad0405f

Browse files
Merge branch 'main' into repo_sync_working_branch
2 parents 2b337a7 + 17e84c2 commit ad0405f

File tree

201 files changed

+1439
-883
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

201 files changed

+1439
-883
lines changed

.openpublishing.redirection.iot-hub.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1088,6 +1088,16 @@
10881088
"redirect_url": "/azure/iot-hub/iot-hub-device-management-iot-toolkit",
10891089
"redirect_document_id": false
10901090
},
1091+
{
1092+
"source_path_from_root": "/articles/iot-hub/iot-hub-operations-monitoring.md",
1093+
"redirect_url": "/azure/iot-hub/monitor-iot-hub",
1094+
"redirect_document_id": false
1095+
},
1096+
{
1097+
"source_path_from_root": "/articles/iot-hub/iot-hub-migrate-to-diagnostics-settings.md",
1098+
"redirect_url": "/azure/iot-hub/monitor-iot-hub",
1099+
"redirect_document_id": false
1100+
},
10911101
{
10921102
"source_path_from_root": "/articles/iot-hub/iot-hub-protocol-gateway.md",
10931103
"redirect_url": "/azure/iot-edge/iot-edge-as-gateway",

.openpublishing.redirection.json

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -623,6 +623,11 @@
623623
"redirect_url": "/azure/azure-arc/kubernetes/",
624624
"redirect_document_id": false
625625
},
626+
{
627+
"source_path": "articles/azure-arc/kubernetes/conceptual-agent-architecture.md",
628+
"redirect_url": "/azure/azure-arc/kubernetes/conceptual-agent-overview",
629+
"redirect_document_id": false
630+
},
626631
{
627632
"source_path": "articles/cognitive-services/whats-new-docs.md",
628633
"redirect_url": "/azure/cognitive-services/what-are-cognitive-services",
@@ -44213,7 +44218,12 @@
4421344218
"redirect_url": "/azure/governance/policy/samples",
4421444219
"redirect_document_id": false
4421544220
},
44216-
{
44221+
{
44222+
"source_path_from_root": "/articles/cognitive-services/QnAMaker/custom-question-answering.md",
44223+
"redirect_url": "/azure/cognitive-services/language-service/question-answering/overview",
44224+
"redirect_document_id": false
44225+
},
44226+
{
4421744227
"source_path_from_root": "/articles/openshift/howto-secure-openshift-with-front-door-feb-22.md",
4421844228
"redirect_url": "/azure/openshift/howto-secure-openshift-with-front-door",
4421944229
"redirect_document_id": false

articles/active-directory-b2c/partner-eid-me.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ To configure your tenant application as a Relying Party in eID-Me the following
101101
| Name | Azure AD B2C/your desired application name |
102102
| Domain | name.onmicrosoft.com |
103103
| Redirect URIs | https://jwt.ms |
104-
| Redirect URLs | https://your-B2C-tenant-name.b2clogin.com/your-B2C-tenant-name.onmicrosoft.com/oauth2/authresp<br>For Example: `https://fabrikam.b2clogin.com/fabrikam.onmicrosoft.com/oauth2/authresp`<br>If you use a custom domain, enter https://your-domain-name/your-tenant-name.onmicrosoft.com/oauth2/authresp.<br> Replace your-domain-name with your custom domain, and your-tenant-name with the name of your tenant. |
104+
| Redirect URLs | `https://your-B2C-tenant-name.b2clogin.com/your-B2C-tenant-name.onmicrosoft.com/oauth2/authresp`<br>For Example: `https://fabrikam.b2clogin.com/fabrikam.onmicrosoft.com/oauth2/authresp`<br>If you use a custom domain, enter https://your-domain-name/your-tenant-name.onmicrosoft.com/oauth2/authresp.<br> Replace your-domain-name with your custom domain, and your-tenant-name with the name of your tenant. |
105105
| URL for application home page | Will be displayed to the end user |
106106
| URL for application privacy policy | Will be displayed to the end user |
107107

@@ -300,7 +300,7 @@ There are additional identity claims that eID-Me supports and can be added.
300300

301301
1. Open the `TrustFrameworksExtension.xml`
302302

303-
2. Find the `BuildingBlocks` element. This is where additional identity claims that eID-Me supports can be added. Full lists of supported eID-Me identity claims with descriptions are mentioned at [http://www.oid-info.com/get/1.3.6.1.4.1.50715](http://www.oid-info.com/get/1.3.6.1.4.1.50715) with the OIDC identifiers used here [https://eid-me.bluink.ca/.well-known/openid-configuration](https://eid-me.bluink.ca/.well-known/openid-configuration).
303+
2. Find the `BuildingBlocks` element. This is where additional identity claims that eID-Me supports can be added. Full lists of supported eID-Me identity claims with descriptions are mentioned at `http://www.oid-info.com/get/1.3.6.1.4.1.50715` with the OIDC identifiers used here [https://eid-me.bluink.ca/.well-known/openid-configuration](https://eid-me.bluink.ca/.well-known/openid-configuration).
304304

305305
```xml
306306
<BuildingBlocks>

articles/active-directory/app-provisioning/on-premises-migrate-microsoft-identity-manager.md

Lines changed: 15 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -21,31 +21,38 @@ You can import into the Azure Active Directory (Azure AD) ECMA Connector Host a
2121
>[!IMPORTANT]
2222
>Currently, only the generic SQL and LDAP connectors are supported for use with the Azure AD ECMA Connector Host.
2323
24-
## Create and export a connector configuration in MIM Sync
25-
If you already have MIM Sync with your ECMA connector configured, skip to step 10.
24+
## Create a connector configuration in MIM Sync
25+
This section is included for illustrative purposes, if you wish to set up MIM Sync with a connector. If you already have MIM Sync with your ECMA connector configured, skip to the next section.
2626

2727
1. Prepare a Windows Server 2016 server, which is distinct from the server that will be used for running the Azure AD ECMA Connector Host. This host server should either have a SQL Server 2016 database colocated or have network connectivity to a SQL Server 2016 database. One way to set up this server is by deploying an Azure virtual machine with the image **SQL Server 2016 SP1 Standard on Windows Server 2016**. This server doesn't need internet connectivity other than remote desktop access for setup purposes.
2828
1. Create an account for use during the MIM Sync installation. It can be a local account on that Windows Server instance. To create a local account, open **Control Panel** > **User Accounts**, and add the user account **mimsync**.
2929
1. Add the account created in the previous step to the local Administrators group.
3030
1. Give the account created earlier the ability to run a service. Start **Local Security Policy** and select **Local Policies** > **User Rights Assignment** > **Log on as a service**. Add the account mentioned earlier.
31-
1. Install MIM Sync on this host. If you don't have MIM Sync binaries, you can install an evaluation by downloading the zip file from the [Microsoft Download Center](https://www.microsoft.com/en-us/download/details.aspx?id=48244), mounting the ISO image, and copying the folder **Synchronization Service** to the Windows Server host. Then run the setup program contained in that folder. Evaluation software is time limited and will expire. It isn't intended for production use.
31+
1. Install MIM Sync on this host.
3232
1. After the installation of MIM Sync is complete, sign out and sign back in.
33-
1. Install your connector on the same server as MIM Sync. For illustration purposes, this test lab guide will illustrate using one of the Microsoft-supplied connectors for download from the [Microsoft Download Center](https://www.microsoft.com/en-us/download/details.aspx?id=51495).
33+
1. Install your connector on the same server as MIM Sync. For illustration purposes, use either of the Microsoft-supplied SQL or LDAP connectors for download from the [Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=51495).
3434
1. Start the Synchronization Service UI. Select **Management Agents**. Select **Create**, and specify the connector management agent. Be sure to select a connector management agent that's ECMA based.
3535
1. Give the connector a name, and configure the parameters needed to import and export data to the connector. Be sure to configure that the connector can import and export single-valued string attributes of a user or person object type.
36+
37+
## Export a connector configuration from MIM Sync
38+
3639
1. On the MIM Sync server computer, start the Synchronization Service UI, if it isn't already running. Select **Management Agents**.
3740
1. Select the connector, and select **Export Management Agent**. Save the XML file, and the DLL and related software for your connector, to the Windows server that will be holding the ECMA Connector Host.
3841

3942
At this point, the MIM Sync server is no longer needed.
4043

41-
1. Sign in to the Windows server as the account that the Azure AD ECMA Connector Host will run as.
44+
## Import a connector configuration
45+
46+
1. Install the ECMA Connector host and provisioning agent on a Windows Server, using the [provisioning users into SQL based applications](on-premises-sql-connector-configure.md#download-install-and-configure-the-azure-ad-connect-provisioning-agent-package) or [provisioning users into LDAP directories](on-premises-ldap-connector-configure.md#download-install-and-configure-the-azure-ad-connect-provisioning-agent-package) articles.
47+
1. Sign in to the Windows server as the account that the Azure AD ECMA Connector Host runs as.
4248
1. Change to the directory C:\Program Files\Microsoft ECMA2host\Service\ECMA. Ensure there are one or more DLLs already present in that directory. Those DLLs correspond to Microsoft-delivered connectors.
4349
1. Copy the MA DLL for your connector, and any of its prerequisite DLLs, to that same ECMA subdirectory of the Service directory.
4450
1. Change to the directory C:\Program Files\Microsoft ECMA2Host\Wizard. Run the program Microsoft.ECMA2Host.ConfigWizard.exe to set up the ECMA Connector Host configuration.
4551
1. A new window appears with a list of connectors. By default, no connectors will be present. Select **New connector**.
46-
1. Specify the management agent XML file that was exported from MIM Sync earlier. Continue with the configuration and schema-mapping instructions from the section "Configure a connector."
52+
1. Specify the management agent XML file that was exported from MIM Sync earlier. Continue with the configuration and schema-mapping instructions from the section "Create a connector" in either the [provisioning users into SQL based applications](on-premises-sql-connector-configure.md#create-a-generic-sql-connector) or [provisioning users into LDAP directories](on-premises-ldap-connector-configure.md#configure-a-generic-ldap-connector) articles.
4753

4854
## Next steps
4955

50-
- [App provisioning](user-provisioning.md)
51-
- [Generic SQL connector](on-premises-sql-connector-configure.md)
56+
- Learn more about [App provisioning](user-provisioning.md)
57+
- [Configuring Azure AD to provision users into SQL based applications](on-premises-sql-connector-configure.md) with the Generic SQL connector
58+
- [Configuring Azure AD to provision users into LDAP directories](on-premises-ldap-connector-configure.md) with the Generic LDAP connector

articles/active-directory/authentication/how-to-migrate-mfa-server-to-azure-mfa-user-authentication.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 06/22/2021
9+
ms.date: 04/07/2022
1010

1111
ms.author: BaSelden
1212
author: BarbaraSelden
@@ -64,7 +64,7 @@ If you are already using Conditional Access to determine when users are prompted
6464
As users are migrated to cloud authentication, they will start using Azure AD MFA as defined by your existing Conditional Access policies.
6565
They won’t be redirected to AD FS and MFA Server anymore.
6666

67-
If your federated domain(s) have SupportsMFA set to false, you are likely enforcing MFA on AD FS using claims rules.
67+
If your federated domain(s) have the [federatedIdpMfaBehavior](/graph/api/resources/federatedIdpMfaBehavior?view=graph-rest-beta) set to `enforceMfaByFederatedIdp` or **SupportsMfa** flag set to `$True` (the **federatedIdpMfaBehavior** overrides **SupportsMfa** when both are set), you are likely enforcing MFA on AD FS using claims rules.
6868
In this case, you will need to analyze your claims rules on the Azure AD relying party trust and create Conditional Access policies that support the same security goals.
6969

7070
If you need to configure Conditional Access policies, you need to do so before enabling staged rollout.

articles/active-directory/authentication/how-to-migrate-mfa-server-to-azure-mfa-with-federation.md

Lines changed: 70 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Step-by-step guidance to move from Azure MFA Server on-premises to
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: how-to
7-
ms.date: 06/22/2021
7+
ms.date: 04/07/2022
88
ms.author: BaSelden
99
author: BarbaraSelden
1010
manager: martinco
@@ -168,33 +168,91 @@ Once you've configured the servers, you can add Azure AD MFA as an additional au
168168

169169
![Screen shot showing the Edit authentication methods screen with Azure MFA and Azure Mutli-factor authentication Server selected](./media/how-to-migrate-mfa-server-to-azure-mfa-user-authentication/edit-authentication-methods.png)
170170

171-
## Prepare Azure AD and implement
171+
## Prepare Azure AD and implement migration
172172

173-
### Ensure SupportsMFA is set to True
173+
This section covers final steps before migrating user phone numbers.
174174

175-
For federated domains, MFA may be enforced by Azure AD Conditional Access or by the on-premises federation provider. Each federated domain in Azure AD has a SupportsMFA flag. When the SupportsMFA flag is set to True, Azure AD redirects users to MFA on AD FS or another federation providers. For example, if a user is accessing an application for which a Conditional Access policy that requires MFA has been configured, the user will be redirected to AD FS. Adding Azure AD MFA as an authentication method in AD FS, enables Azure AD MFA to be invoked once your configurations are complete.
175+
### Set federatedIdpMfaBehavior to enforceMfaByFederatedIdp
176176

177-
If the SupportsMFA flag is set to False, you're likely not using Azure MFA; you're probably using claims rules on AD FS relying parties to invoke MFA.
177+
For federated domains, MFA may be enforced by Azure AD Conditional Access or by the on-premises federation provider. Each federated domain has a Microsoft Graph PowerShell security setting named **federatedIdpMfaBehavior**. You can set **federatedIdpMfaBehavior** to `enforceMfaByFederatedIdp` so Azure AD accepts MFA that's performed by the federated identity provider. If the federated identity provider didn't perform MFA, Azure AD redirects the request to the federated identity provider to perform MFA. For more information, see [federatedIdpMfaBehavior](/graph/api/resources/federatedIdpMfaBehavior?view=graph-rest-beta&preserve-view=true).
178178

179-
You can check the status of your SupportsMFA flag with the following [Windows PowerShell cmdlet](/powershell/module/msonline/get-msoldomainfederationsettings):
179+
>[!NOTE]
180+
> The **federatedIdpMfaBehavior** setting is an evolved version of the **SupportsMfa** property of the [Set-MsolDomainFederationSettings MSOnline v1 PowerShell cmdlet](/powershell/module/msonline/set-msoldomainfederationsettings).
181+
182+
For domains that have already set the **SupportsMfa** property, these rules determine how **federatedIdpMfaBehavior** and **SupportsMfa** work together:
183+
184+
- Switching between **federatedIdpMfaBehavior** and **SupportsMfa** is not supported.
185+
- Once **federatedIdpMfaBehavior** property is set, Azure AD ignores the **SupportsMfa** setting.
186+
- If the **federatedIdpMfaBehavior** property is never set, Azure AD will continue to honor the **SupportsMfa** setting.
187+
- If neither **federatedIdpMfaBehavior** nor **SupportsMfa** is set, Azure AD will default to `acceptIfMfaDoneByFederatedIdp` behavior.
188+
189+
You can check the status of **federatedIdpMfaBehavior** by using [Get-MgDomainFederationConfiguration](/powershell/module/microsoft.graph.identity.directorymanagement/get-mgdomainfederationconfiguration?view=graph-powershell-beta&preserve-view=true).
180190

181191
```powershell
182-
Get-MsolDomainFederationSettings –DomainName yourdomain.com
192+
Get-MgDomainFederationConfiguration –DomainID yourdomain.com
183193
```
184194

185-
If the SupportsMFA flag is set to false or is blank for your federated domain, set it to true using the following Windows PowerShell cmdlet:
195+
You can also check the status of your **SupportsMfa** flag with [Get-MsolDomainFederationSettings](/powershell/module/msonline/get-msoldomainfederationsettings):
186196

187197
```powershell
188-
Set-MsolDomainFederationSettings -DomainName contoso.com -SupportsMFA $true
198+
Get-MsolDomainFederationSettings –DomainName yourdomain.com
199+
```
200+
201+
The following example shows how to set **federatedIdpMfaBehavior** to `enforceMfaByFederatedIdp` by using Graph PowerShell.
202+
203+
#### Request
204+
<!-- {
205+
"blockType": "request",
206+
"name": "update_internaldomainfederation"
207+
}
208+
-->
209+
``` http
210+
PATCH https://graph.microsoft.com/beta/domains/contoso.com/federationConfiguration/6601d14b-d113-8f64-fda2-9b5ddda18ecc
211+
Content-Type: application/json
212+
{
213+
"federatedIdpMfaBehavior": "enforceMfaByFederatedIdp"
214+
}
215+
```
216+
217+
218+
#### Response
219+
>**Note:** The response object shown here might be shortened for readability.
220+
<!-- {
221+
"blockType": "response",
222+
"truncated": true,
223+
"@odata.type": "microsoft.graph.internalDomainFederation"
224+
}
225+
-->
226+
``` http
227+
HTTP/1.1 200 OK
228+
Content-Type: application/json
229+
{
230+
"@odata.type": "#microsoft.graph.internalDomainFederation",
231+
"id": "6601d14b-d113-8f64-fda2-9b5ddda18ecc",
232+
"issuerUri": "http://contoso.com/adfs/services/trust",
233+
"metadataExchangeUri": "https://sts.contoso.com/adfs/services/trust/mex",
234+
"signingCertificate": "MIIE3jCCAsagAwIBAgIQQcyDaZz3MI",
235+
"passiveSignInUri": "https://sts.contoso.com/adfs/ls",
236+
"preferredAuthenticationProtocol": "wsFed",
237+
"activeSignInUri": "https://sts.contoso.com/adfs/services/trust/2005/usernamemixed",
238+
"signOutUri": "https://sts.contoso.com/adfs/ls",
239+
"promptLoginBehavior": "nativeSupport",
240+
"isSignedAuthenticationRequestRequired": true,
241+
"nextSigningCertificate": "MIIE3jCCAsagAwIBAgIQQcyDaZz3MI",
242+
"signingCertificateUpdateStatus": {
243+
"certificateUpdateResult": "Success",
244+
"lastRunDateTime": "2021-08-25T07:44:46.2616778Z"
245+
},
246+
"federatedIdpMfaBehavior": "enforceMfaByFederatedIdp"
247+
}
189248
```
190249

191-
This configuration allows the decision to use MFA Server or Azure MFA to be made on AD FS.
192250

193251
### Configure Conditional Access policies if needed
194252

195253
If you use Conditional Access to determine when users are prompted for MFA, you shouldn't need to change your policies.
196254

197-
If your federated domain(s) have SupportsMFA set to false, analyze your claims rules on the Azure AD relying party trust and create Conditional Access policies that support the same security goals.
255+
If your federated domain(s) have SupportsMfa set to false, analyze your claims rules on the Azure AD relying party trust and create Conditional Access policies that support the same security goals.
198256

199257
After creating conditional access policies to enforce the same controls as AD FS, you can back up and remove your claim rules customizations on the Azure AD Relying Party.
200258

@@ -300,7 +358,7 @@ Detailed Azure MFA registration information can be found on the Registration tab
300358

301359
![Image of Authentication methods activity screen showing user registrations to MFA](./media/how-to-migrate-mfa-server-to-azure-mfa-with-federation/authentication-methods.png)
302360

303-
361+
304362

305363
## Clean up steps
306364

0 commit comments

Comments
 (0)